network security threat model buffer overflow firewall security social antivirus software security networking software vulnerabilities internet security exploit security program manager internet smart card module smart card deployment